BreachPersonallyidentifiableinformation(PII)VulnerabilityZero-dayWormEncryptionSoftwareupdatesIntrusionExploitTrainingAwarenessTrainingSpearphishingScreenlockpolicyVirus12CharacterPasswordsDarkwebPhishingCompromiseMalwareWhalephishingMulti-factorauthentication(MFA)ExtorsionPasswordSafe ToolRansomwareBreachPersonallyidentifiableinformation(PII)VulnerabilityZero-dayWormEncryptionSoftwareupdatesIntrusionExploitTrainingAwarenessTrainingSpearphishingScreenlockpolicyVirus12CharacterPasswordsDarkwebPhishingCompromiseMalwareWhalephishingMulti-factorauthentication(MFA)ExtorsionPasswordSafe ToolRansomware

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Breach
  2. Personally identifiable information (PII)
  3. Vulnerability
  4. Zero-day
  5. Worm
  6. Encryption
  7. Software updates
  8. Intrusion
  9. Exploit
  10. Training
  11. Awareness Training
  12. Spear phishing
  13. Screen lock policy
  14. Virus
  15. 12 Character Passwords
  16. Dark web
  17. Phishing
  18. Compromise
  19. Malware
  20. Whale phishing
  21. Multi-factor authentication (MFA)
  22. Extorsion
  23. Password Safe Tool
  24. Ransomware